Project Analyst Security & Compliance
Job in
Cleveland, Cuyahoga County, Ohio, 44115, USA
Listed on 2026-03-09
Listing for:
Cleveland State University
Per diem
position Listed on 2026-03-09
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Data Security
Job Description & How to Apply Below
Posting Details
Business Title
Project Analyst Security & Compliance
Posting Category
IT/Technology
Salary Grade
08T
Salary Plan
Professional Staff - SEIU
Hiring Range /Pay Rate
Department
Information Services & Technol
Department Description
Position Location
Main Campus
FTE
1.0
Job Summary
Oversees Cleveland State Universities (CSU) Identity and Access Management (IAM) and Identity Management (IDM) systems. Responsible for the integrity, security, and compliance of CSU's access management policies, practices, and processes and ensures all IAM strategies align with CSU's goals and objectives. Oversees the development and delivery of IAM/IDM security standards, best practices, architecture, and systems to continuously improve identity governance and security across CSU.
Leads cross-functional teams to design and implement effective identity solutions and collaborates closely with campus business partners to safeguard sensitive data while optimizing user experience. Serves on various internal and external committees, ensuring collaboration with stakeholders and improved security posture. Collaborates with IS&T and campus partners to evaluate and adopt solutions and methodologies to support key CSU initiatives and improve security.
Performs other functionally related duties as assigned.
Minimum Qualifications
- Bachelor's degree preferably in computer science, information technology, business administration, or a related field.
- Four (4) years of experience in a data processing environment including systems analysis, auditing, project management and programming.
- Experience in IT security in a large-scale, multi-vendor computer environment.
- Experience in identity and access management including implementation projects in mid-size to larger organizations.
- Requires occasional evening or weekend work and travel to various organizational locations or vendor sites, as necessary.
- Certifications in Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Global Information Assurance Certification (GIAC), or equivalent.
- Experience with system security-related products, such as Cisco and cybersecurity experience supporting compliance with legal best practices and regulatory compliance for cloud alternatives.
- Experience with Identity Access Management systems e.g., role-based security, least privilege principle, CIA.
- Experience in operating systems, such as Linux and Windows and SIEM tools, such as Splunk.
- Integration strategies across multiple enterprise systems.
- Knowledge of iterative implementation methodologies, such as agile.
- In-depth knowledge of data governance standards, privacy laws e.g., General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Gramm-Leach-Bliley Act (GLBA), Federal Trade Commission (FTC) Safeguards Rule and IAM/IDM data requirements. Proficiency in establishing policies for data integrity, security, and compliance during and after migration. Capacity to collaborate with IS&T leaders to prioritize data governance measures supporting data security and adherence across the organization.
- Knowledge of IAM/IDM data architecture, user provisioning, authentication, authorization, and directory services. Capability to oversee data migration, integration, and system administration of the IAM/IDM tool. Ability to display analytical thinking to extract insights from IAM/IDM tool that assists with management of identity governance and architecture.
- Knowledge of IAM/IDM tool implementation impacts to cross-functional areas e.g., finance, operations, human resources. Proficiency in communicating data governance identity management to executives, department heads, and end-users. Ability to advocate for IAM/IDM initiatives and stakeholder needs.
- Knowledge of data risks e.g., breaches, migration errors and metrics to measure IAM/IDM successes in the various implementation phases. Ability to mitigate risks through security measures and track organizational impact via KPIs e.g., adoption, accuracy. Ability to safeguard system quality and the ability to assess and communicate IAM and IDM system value to all stakeholders.
PT0703756S
Date grant, position, or appointment expires (For Funds Available, Temporary, and Waiver of Posting
Special Instructions to Applicants
Applicant Instructions
Offer of employment is contingent on satisfactory completion of the University's verification of credentials and other information required by law and/or University policies or practices, including but not limited to a criminal background check.
Applications will be exclusively accepted online at http://(Use the "Apply for this Job" box below)..html. Mailed or emailed application materials will not be accepted.
Hours per week
40
Work Schedule
Advertising Copy
Full Time/Part Time
Full Time
Posted Date
01/29/2026
Close Date/Final date to receive applications
Open Until Filled
Yes
Review Begins
02/04/2026
Tentative Start…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×